Sciweavers

3149 search results - page 93 / 630
» IT security risk management
Sort
View
HAIS
2008
Springer
13 years 10 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ISI
2004
Springer
14 years 2 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ANOR
2007
103views more  ANOR 2007»
13 years 9 months ago
A semi-analytical method for VaR and credit exposure analysis
In this paper, we discuss new analytical methods for computing Value-at-Risk (VaR)andacreditexposureprofile.UsingaMonteCarlosimulationapproachasabenchmark, we find that the analy...
Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ah...
GRID
2005
Springer
14 years 2 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney